<--- Back to Details
First PageDocument Content
Software / Computing / BitTorrent / Concurrent computing / Goalbit / Peer-to-peer / Torrent file / Peer-to-Peer Assisted Streaming Solution / EMule / Ares Galaxy / BitTorrent protocol encryption / Torrent poisoning
Date: 2016-02-19 12:51:03
Software
Computing
BitTorrent
Concurrent computing
Goalbit
Peer-to-peer
Torrent file
Peer-to-Peer Assisted Streaming Solution
EMule
Ares Galaxy
BitTorrent protocol encryption
Torrent poisoning

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

Add to Reading List

Source URL: goalbit-solutions.com

Download Document from Source Website

File Size: 1,69 MB

Share Document on Facebook

Similar Documents

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera

DocID: 1rh3L - View Document

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

Poisoning the Kad Network

Poisoning the Kad Network

DocID: 1r1lv - View Document

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qHqY - View Document

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qCno - View Document